BibTeX records: Johanna Amann

download as .bib file

@inproceedings{DBLP:conf/sec/WilkensHA022,
  author       = {Florian Wilkens and
                  Steffen Haas and
                  Johanna Amann and
                  Mathias Fischer},
  editor       = {Weizhi Meng and
                  Simone Fischer{-}H{\"{u}}bner and
                  Christian Damsgaard Jensen},
  title        = {Passive, Transparent, and Selective {TLS} Decryption for Network Security
                  Monitoring},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11
                  International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15,
                  2022, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {648},
  pages        = {87--105},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06975-8\_6},
  doi          = {10.1007/978-3-031-06975-8\_6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/WilkensHA022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2021,
  editor       = {Dave Levin and
                  Alan Mislove and
                  Johanna Amann and
                  Matthew Luckie},
  title        = {{IMC} '21: {ACM} Internet Measurement Conference, Virtual Event, USA,
                  November 2-4, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3487552},
  doi          = {10.1145/3487552},
  isbn         = {978-1-4503-9129-0},
  timestamp    = {Thu, 04 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-09828,
  author       = {Florian Wilkens and
                  Steffen Haas and
                  Johanna Amann and
                  Mathias Fischer},
  title        = {Passive, Transparent, and Selective {TLS} Decryption for Network Security
                  Monitoring},
  journal      = {CoRR},
  volume       = {abs/2104.09828},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.09828},
  eprinttype    = {arXiv},
  eprint       = {2104.09828},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-09828.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/HolzHARJVH20,
  author       = {Ralph Holz and
                  Jens Hiller and
                  Johanna Amann and
                  Abbas Razaghpanah and
                  Thomas Jost and
                  Narseo Vallina{-}Rodriguez and
                  Oliver Hohlfeld},
  title        = {Tracking the deployment of {TLS} 1.3 on the web: a story of experimentation
                  and centralization},
  journal      = {Comput. Commun. Rev.},
  volume       = {50},
  number       = {3},
  pages        = {3--15},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411740.3411742},
  doi          = {10.1145/3411740.3411742},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/HolzHARJVH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HillerAH20,
  author       = {Jens Hiller and
                  Johanna Amann and
                  Oliver Hohlfeld},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice
                  in Public Key Infrastructures},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1289--1306},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423345},
  doi          = {10.1145/3372297.3423345},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HillerAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/HolzPVACELNS20,
  author       = {Ralph Holz and
                  Diego Perino and
                  Matteo Varvello and
                  Johanna Amann and
                  Andrea Continella and
                  Nate Evans and
                  Ilias Leontiadis and
                  Christopher Natoli and
                  Quirin Scheitle},
  editor       = {Georgios Smaragdakis and
                  Anja Feldmann and
                  Anna Brunstr{\"{o}}m and
                  Gareth Tyson},
  title        = {A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency
                  Mining on the Web},
  booktitle    = {4th Network Traffic Measurement and Analysis Conference, {TMA} 2020,
                  Berlin, Germany, June 10, 2020},
  publisher    = {{IFIP}},
  year         = {2020},
  url          = {http://dl.ifip.org/db/conf/tma/tma2020/tma2020-camera-paper29.pdf},
  timestamp    = {Fri, 01 Oct 2021 09:14:31 +0200},
  biburl       = {https://dblp.org/rec/conf/tma/HolzPVACELNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-13239,
  author       = {Ralph Holz and
                  Diego Perino and
                  Matteo Varvello and
                  Johanna Amann and
                  Andrea Continella and
                  Nate Evans and
                  Ilias Leontiadis and
                  Christopher Natoli and
                  Quirin Scheitle},
  title        = {A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency
                  Mining on the Web},
  journal      = {CoRR},
  volume       = {abs/2004.13239},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.13239},
  eprinttype    = {arXiv},
  eprint       = {2004.13239},
  timestamp    = {Sat, 02 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-13239.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-08772,
  author       = {Jens Hiller and
                  Johanna Amann and
                  Oliver Hohlfeld},
  title        = {The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice
                  in Public Key Infrastructures},
  journal      = {CoRR},
  volume       = {abs/2009.08772},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.08772},
  eprinttype    = {arXiv},
  eprint       = {2009.08772},
  timestamp    = {Wed, 23 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-08772.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-12762,
  author       = {Ralph Holz and
                  Johanna Amann and
                  Abbas Razaghpanah and
                  Narseo Vallina{-}Rodriguez},
  title        = {The Era of {TLS} 1.3: Measuring Deployment and Use with Active and
                  Passive Methods},
  journal      = {CoRR},
  volume       = {abs/1907.12762},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.12762},
  eprinttype    = {arXiv},
  eprint       = {1907.12762},
  timestamp    = {Fri, 02 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-12762.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/anrw/ScheitleCAGBCHH18,
  author       = {Quirin Scheitle and
                  Taejoong Chung and
                  Johanna Amann and
                  Oliver Gasser and
                  Lexi Brent and
                  Georg Carle and
                  Ralph Holz and
                  Jens Hiller and
                  Johannes Naab and
                  Roland van Rijswijk{-}Deij and
                  Oliver Hohlfeld and
                  David R. Choffnes and
                  Alan Mislove},
  title        = {Measuring Adoption of Security Additions to the {HTTPS} Ecosystem},
  booktitle    = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018,
                  Montreal, QC, Canada, July 16-16, 2018},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3232755.3232756},
  doi          = {10.1145/3232755.3232756},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/anrw/ScheitleCAGBCHH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/anrw/RazaghpanahNVSA18,
  author       = {Abbas Razaghpanah and
                  Arian Akhavan Niaki and
                  Narseo Vallina{-}Rodriguez and
                  Srikanth Sundaresan and
                  Johanna Amann and
                  Phillipa Gill},
  title        = {Studying {TLS} Usage in Android Apps},
  booktitle    = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018,
                  Montreal, QC, Canada, July 16-16, 2018},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3232755.3232779},
  doi          = {10.1145/3232755.3232779},
  timestamp    = {Wed, 26 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/anrw/RazaghpanahNVSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ScheitleGNABCHS18,
  author       = {Quirin Scheitle and
                  Oliver Gasser and
                  Theodor Nolte and
                  Johanna Amann and
                  Lexi Brent and
                  Georg Carle and
                  Ralph Holz and
                  Thomas C. Schmidt and
                  Matthias W{\"{a}}hlisch},
  title        = {The Rise of Certificate Transparency and Its Implications on the Internet
                  Ecosystem},
  booktitle    = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
                  Boston, MA, USA, October 31 - November 02, 2018},
  pages        = {343--349},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3278562},
  timestamp    = {Fri, 25 Oct 2019 09:51:49 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/ScheitleGNABCHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KotziasRAPVC18,
  author       = {Platon Kotzias and
                  Abbas Razaghpanah and
                  Johanna Amann and
                  Kenneth G. Paterson and
                  Narseo Vallina{-}Rodriguez and
                  Juan Caballero},
  title        = {Coming of Age: {A} Longitudinal Study of {TLS} Deployment},
  booktitle    = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
                  Boston, MA, USA, October 31 - November 02, 2018},
  pages        = {415--428},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3278568},
  timestamp    = {Fri, 25 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/KotziasRAPVC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-08325,
  author       = {Quirin Scheitle and
                  Oliver Gasser and
                  Theodor Nolte and
                  Johanna Amann and
                  Lexi Brent and
                  Georg Carle and
                  Ralph Holz and
                  Thomas C. Schmidt and
                  Matthias W{\"{a}}hlisch},
  title        = {The Rise of Certificate Transparency and Its Implications on the Internet
                  Ecosystem},
  journal      = {CoRR},
  volume       = {abs/1809.08325},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.08325},
  eprinttype    = {arXiv},
  eprint       = {1809.08325},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-08325.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AmannS17,
  author       = {Johanna Amann and
                  Robin Sommer},
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Viable Protection of High-Performance Networks through Hardware/Software
                  Co-Design},
  booktitle    = {Proceedings of the {ACM} International Workshop on Security in Software
                  Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY
                  2017, Scottsdale, Arizona, USA, March 24, 2017},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3040992.3041003},
  doi          = {10.1145/3040992.3041003},
  timestamp    = {Tue, 06 Nov 2018 11:07:47 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/AmannS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/RazaghpanahNVSA17,
  author       = {Abbas Razaghpanah and
                  Arian Akhavan Niaki and
                  Narseo Vallina{-}Rodriguez and
                  Srikanth Sundaresan and
                  Johanna Amann and
                  Phillipa Gill},
  title        = {Studying {TLS} Usage in Android Apps},
  booktitle    = {Proceedings of the 13th International Conference on emerging Networking
                  EXperiments and Technologies, CoNEXT 2017, Incheon, Republic of Korea,
                  December 12 - 15, 2017},
  pages        = {350--362},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3143361.3143400},
  doi          = {10.1145/3143361.3143400},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/RazaghpanahNVSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/AmannGSBCH17,
  author       = {Johanna Amann and
                  Oliver Gasser and
                  Quirin Scheitle and
                  Lexi Brent and
                  Georg Carle and
                  Ralph Holz},
  editor       = {Steve Uhlig and
                  Olaf Maennel},
  title        = {Mission accomplished?: {HTTPS} security after diginotar},
  booktitle    = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
                  London, United Kingdom, November 1-3, 2017},
  pages        = {325--340},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131365.3131401},
  doi          = {10.1145/3131365.3131401},
  timestamp    = {Fri, 25 Oct 2019 09:51:18 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/AmannGSBCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2017,
  editor       = {Mohamed Ali K{\^{a}}afar and
                  Steve Uhlig and
                  Johanna Amann},
  title        = {Passive and Active Measurement - 18th International Conference, {PAM}
                  2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10176},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54328-4},
  doi          = {10.1007/978-3-319-54328-4},
  isbn         = {978-3-319-54327-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SommerAH16,
  author       = {Robin Sommer and
                  Johanna Amann and
                  Seth Hall},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Spicy: a unified deep packet inspection framework for safely dissecting
                  all your data},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {558--569},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991100},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SommerAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/VanderSlootABDB16,
  author       = {Benjamin VanderSloot and
                  Johanna Amann and
                  Matthew Bernhard and
                  Zakir Durumeric and
                  Michael D. Bailey and
                  J. Alex Halderman},
  editor       = {Phillipa Gill and
                  John S. Heidemann and
                  John W. Byers and
                  Ramesh Govindan},
  title        = {Towards a Complete View of the Certificate Ecosystem},
  booktitle    = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
                  {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages        = {543--549},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2987462},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/VanderSlootABDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HolzAMKW16,
  author       = {Ralph Holz and
                  Johanna Amann and
                  Olivier Mehani and
                  Mohamed Ali K{\^{a}}afar and
                  Matthias Wachs},
  title        = {{TLS} in the Wild: An Internet-wide Analysis of TLS-based Protocols
                  for Electronic Communication},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/tls-wild-internet-wide-analysis-tls-based-protocols-electronic-communication.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/HolzAMKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/AmannS16,
  author       = {Johanna Amann and
                  Robin Sommer},
  editor       = {Thomas Karagiannis and
                  Xenofontas A. Dimitropoulos},
  title        = {Exploring Tor's Activity Through Long-Term Passive {TLS} Traffic Measurement},
  booktitle    = {Passive and Active Measurement - 17th International Conference, {PAM}
                  2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9631},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-30505-9\_1},
  doi          = {10.1007/978-3-319-30505-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/AmannS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/ZhuAH16,
  author       = {Liang Zhu and
                  Johanna Amann and
                  John S. Heidemann},
  editor       = {Thomas Karagiannis and
                  Xenofontas A. Dimitropoulos},
  title        = {Measuring the Latency and Pervasiveness of {TLS} Certificate Revocation},
  booktitle    = {Passive and Active Measurement - 17th International Conference, {PAM}
                  2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9631},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-30505-9\_2},
  doi          = {10.1007/978-3-319-30505-9\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/ZhuAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CaselliZASK16,
  author       = {Marco Caselli and
                  Emmanuele Zambon and
                  Johanna Amann and
                  Robin Sommer and
                  Frank Kargl},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Specification Mining for Intrusion Detection in Networked Control
                  Systems},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {791--806},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/caselli},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CaselliZASK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AmannS15,
  author       = {Johanna Amann and
                  Robin Sommer},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Providing Dynamic Control to Passive Network Security Monitoring},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_7},
  doi          = {10.1007/978-3-319-26362-5\_7},
  timestamp    = {Sun, 25 Oct 2020 22:56:09 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/AmannS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HolzAMWK15,
  author       = {Ralph Holz and
                  Johanna Amann and
                  Olivier Mehani and
                  Matthias Wachs and
                  Mohamed Ali K{\^{a}}afar},
  title        = {{TLS} in the wild: an Internet-wide analysis of TLS-based protocols
                  for electronic communication},
  journal      = {CoRR},
  volume       = {abs/1511.00341},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.00341},
  eprinttype    = {arXiv},
  eprint       = {1511.00341},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HolzAMWK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tinytocs/AmannSVH15,
  author       = {Johanna Amann and
                  Robin Sommer and
                  Matthias Vallentin and
                  Seth Hall},
  title        = {To Trust, or not to Trust, that is the Question: Structural Properties
                  of {X.509} Certificates},
  journal      = {Tiny Trans. Comput. Sci.},
  volume       = {3},
  year         = {2015},
  url          = {http://tinytocs.org/vol3/papers/TinyToCS\_3\_amann.pdf},
  timestamp    = {Tue, 14 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tinytocs/AmannSVH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/Vallina-RodriguezAKWP14,
  author       = {Narseo Vallina{-}Rodriguez and
                  Johanna Amann and
                  Christian Kreibich and
                  Nicholas Weaver and
                  Vern Paxson},
  editor       = {Aruna Seneviratne and
                  Christophe Diot and
                  Jim Kurose and
                  Augustin Chaintreau and
                  Luigi Rizzo},
  title        = {A Tangled Mass: The Android Root Certificate Stores},
  booktitle    = {Proceedings of the 10th {ACM} International on Conference on emerging
                  Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia,
                  December 2-5, 2014},
  pages        = {141--148},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2674005.2675015},
  doi          = {10.1145/2674005.2675015},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/Vallina-RodriguezAKWP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/DurumericKAHBLWABPP14,
  author       = {Zakir Durumeric and
                  James Kasten and
                  David Adrian and
                  J. Alex Halderman and
                  Michael D. Bailey and
                  Frank Li and
                  Nicholas Weaver and
                  Johanna Amann and
                  Jethro Beekman and
                  Mathias Payer and
                  Vern Paxson},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {The Matter of Heartbleed},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {475--488},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663755},
  doi          = {10.1145/2663716.2663755},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/DurumericKAHBLWABPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AmannHS14,
  author       = {Johanna Amann and
                  Seth Hall and
                  Robin Sommer},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Count Me In: Viable Distributed Summary Statistics for Securing High-Speed
                  Networks},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {320--340},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_16},
  doi          = {10.1007/978-3-319-11379-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AmannHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AmannSVH13,
  author       = {B. Amann and
                  Robin Sommer and
                  Matthias Vallentin and
                  Seth Hall},
  editor       = {Charles N. Payne Jr.},
  title        = {No attack necessary: the surprising dynamics of {SSL} trust relationships},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {179--188},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523665},
  doi          = {10.1145/2523649.2523665},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AmannSVH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/AkhaweAVS13,
  author       = {Devdatta Akhawe and
                  B. Amann and
                  Matthias Vallentin and
                  Robin Sommer},
  editor       = {Daniel Schwabe and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Hartmut Glaser and
                  Ricardo Baeza{-}Yates and
                  Sue B. Moon},
  title        = {Here's my cert, so trust me, maybe?: understanding {TLS} errors on
                  the web},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013},
  pages        = {59--70},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488388.2488395},
  doi          = {10.1145/2488388.2488395},
  timestamp    = {Wed, 07 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/AkhaweAVS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AmannSSH12,
  author       = {B. Amann and
                  Robin Sommer and
                  Aashish Sharma and
                  Seth Hall},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time
                  Intelligence},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {314--333},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_16},
  doi          = {10.1007/978-3-642-33338-5\_16},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AmannSSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Amann11,
  author       = {Johanna Amann},
  title        = {Redundancy and access permissions in decentralized file systems},
  school       = {Technical University Munich},
  year         = {2011},
  url          = {https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20110905-1079733-0-6},
  urn          = {urn:nbn:de:bvb:91-diss-20110905-1079733-0-6},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Amann11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/AmannF10,
  author       = {B. Amann and
                  Thomas Fuhrmann},
  title        = {Cryptographically Enforced Permissions for Fully Decentralized File
                  Systems},
  booktitle    = {{IEEE} Tenth International Conference on Peer-to-Peer Computing, {P2P}
                  2010, Delft, The Netherlands, 25-27 August 2010},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/P2P.2010.5569990},
  doi          = {10.1109/P2P.2010.5569990},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/AmannF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/HouriAF10,
  author       = {Yaser Houri and
                  B. Amann and
                  Thomas Fuhrmann},
  editor       = {Shlomi Dolev and
                  Jorge Arturo Cobb and
                  Michael J. Fischer and
                  Moti Yung},
  title        = {A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage
                  Systems},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 12th
                  International Symposium, {SSS} 2010, New York, NY, USA, September
                  20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6366},
  pages        = {519--530},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16023-3\_40},
  doi          = {10.1007/978-3-642-16023-3\_40},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/HouriAF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/AmannEHF08,
  author       = {B. Amann and
                  Benedikt Elser and
                  Yaser Houri and
                  Thomas Fuhrmann},
  editor       = {Klaus Wehrle and
                  Wolfgang Kellerer and
                  Sandeep K. Singhal and
                  Ralf Steinmetz},
  title        = {IgorFs: {A} Distributed {P2P} File System},
  booktitle    = {Proceedings P2P'08, Eighth International Conference on Peer-to-Peer
                  Computing, 8-11 September 2008, Aachen, Germany},
  pages        = {77--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/P2P.2008.19},
  doi          = {10.1109/P2P.2008.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/p2p/AmannEHF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}